Drive Security Automation at Machine Speed

Presented by

Mike Parkin, Technical Marketing Engineer, Gurucul

About this talk

Automation has been a cornerstone of System and Security Administration for years. Admins have always written scripts and developed tools that let them be more efficient, working smarter rather than harder. But automation relies on knowing all the variables and all the steps and fitting them together into a coherent whole. While that's an easy concept to work with for a SysAdmin automating their patch cycles, it's harder in the security world where the variables and steps are often in flux. Advanced security analytics changes that, by applying artificial intelligence and machine learning to the problem. It lets the variables and steps be a little fuzzy around the edges, while still providing a hard edged reaction to security events. Rather than an administrator having to adapt their automation manually, the AI can adapt it seamlessly and almost instantly. Join us for a look at how Artificial Intelligence can drive security automation at Machine Speed.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (69)
Subscribers (3236)
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.